Sie sind auf Seite 1von 11

Adhoc and Sensor Networks

Year :2015-2016
IV Year B.Tech (CSE) II Sem
Text Books:
1. Ad Hoc and Sensor Networks Theory and Applications, Carlos Corderio
Dharma P.Aggarwal, World Scientific Publications, March 2006, ISBN 981
- 256-681-3
2.Wireless Sensor Networks: An Information Processing Approach,
Feng Zhao, Leonidas Guibas, Elsevier Science, ISBN 978-1-55860914-3 ( Morgan Kauffman)

Table of Contents
Chapters:

1. Introduction
2. Routing in Ad hoc Networks
3. Broadcasting, Multicasting and Geocasting
4. Wireless LANs
5. Wireless PANs
6. Directional Antenna Systems
7. TCP over Ad Hoc Networks
8. Wireless Sensor Networks
9. Data Retrieval in Sensor Networks
10.Security
11. Integrating
MANETs,
Networks

WLANs

and

Cellular

Chapter 1: Introduction

Introduction
The Communication Puzzle
Applications of MANETs
Challenges
Scalability
Quality of Service
Client-Server Model Shift
Security
Interoperation with the Internet
Energy Conservation
Node (MH) Cooperation

Interoperation
Book Organization
Conclusions and Future Directions
Homework Questions/Simulation Projects
References

A Mobile Ad Hoc Network (MANET)

MH2
MH2
MH4

Asymmetric link

MH3

MH5
MH7

Symmetric link
MH1

MH6

Characteristics of a MANET

An autonomous system of nodes (Mobile Hosts:


MHs) connected by wireless links

Same channel used by all nodes


Lack of fixed infrastructure
Absence of centralized authority
Peer-to-peer connectivity

Multi-hop forwarding to ensure network connectivity

Topology may change dynamically


Random Multi-hop Graph
Energy-constrained
Bandwidth-constrained, variable capacity links

Important characteristics of a MANET

Characteristic Description
Dynamic
Topologies

Nodes are free to move arbitrarily with different speeds; thus, the
network topology may change randomly and at unpredictable times.

Energy- constrained
Operation

Some or all of the nodes in an ad hoc network may rely on batteries or other
exhaustible means for their energy. For these nodes, the most important system
design optimization criteria may be energy conservation.

Limited Bandwidth

Wireless links continue to have significantly lower capacity than infrastructured


networks. In addition, the realized throughput of wireless communications after
accounting for the effects of multiple access, fading, noise, and interference
conditions, etc., is often much less than a radios maximum transmission rate.

Security

Mobile wireless networks are generally more prone to physical security threats than
fixed-cable nets. The increased possibility of eavesdropping, spoofing, and
minimization of denial-of-service type attacks should be carefully considered.

Threats

The envisioned communication puzzle of 4G and beyond

The scope of various wireless technologies

Applications of MANETs

Collaborative Work

Collaborative computing might be important outside office environments

Crisis-management Applications

Natural disasters with entire communications infrastructure in disarray

Restoring communications quickly is essential

Infrastructure could be set up in hours instead of days/weeks

Personal Area Networking

Short-range, localized network of nodes associated with a person

Nodes could be attached to someones cell phone, pulse watch, belt, etc.

Bluetooth is an example

Eliminates need of wires between devices such as printers, cell phones, PDAs, laptop
computers, headsets, etc.
IEEE 802.15 standard working group

Future Challenges in Adhoc and Sensor Networks


Scalability

N
Short-range Throughput per node decreases at at a rate 1/
, where N is
the number of nodes
This cannot be fixed except by physical layer improvements, such as directional
antennas

Quality of service
Need to provide best-effort service only for Voice, live video and file transfer
Client server model shift
There is no server, but demand for basic services still exists.
Address allocation, name resolution, authentication and service location are just
examples of very basic services which are needed
Security
Lack of any centralized network management or certification authority
Networks are particularly prone to malicious behavior
Interoperation with the Internet
Networks require some Internet connection
Interface between the two are very different
Energy conservation
Lifetime of a single battery and the whole network.
Node cooperation
Why anyone should relay other peoples data
Interoperation
What happens when two autonomous ad hoc networks move into same area

Book Organization
LL
MA
A
CN
Tr
P
p
et
a
h
p
w
Lin
n
ys
li
Dat
or
k
s
icc
ak
p
ala
or
ti
t
o
n

All chapters

Chapters 7,
9 and 11
Chapters 2, 3, 6,
8, 9, 10,and 11
Chapters 4, 5, 6,
8, 9, and 11
Chapters 4,
5, 6, and 11

Das könnte Ihnen auch gefallen